Jakob Wenzel

Affiliations:
  • Bauhaus University, Weimar, Germany


According to our database1, Jakob Wenzel authored at least 23 papers between 2011 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Design and Analysis of Cryptographic Algorithms for Authentication.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

2018
POEx: A beyond-birthday-bound-secure on-line cipher.
Cryptogr. Commun., 2018

2017
Design and Analysis of Cryptographic Algorithms for Authentication.
PhD thesis, 2017

Reforgeability of Authenticated Encryption Schemes.
IACR Cryptol. ePrint Arch., 2017

2016
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch.
IACR Cryptol. ePrint Arch., 2016

RIV for Robust Authenticated Encryption.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

2015
Catena Variants - Different Instantiations for an Extremely Flexible Password-Hashing Framework.
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015

2014
COFFE: Ciphertext Output Feedback Faithful Encryption.
IACR Cryptol. ePrint Arch., 2014

Overview of the Candidates for the Password Hashing Competition - And their Resistance against Garbage-Collector Attacks.
IACR Cryptol. ePrint Arch., 2014

Pipelineable On-Line Encryption.
IACR Cryptol. ePrint Arch., 2014

Differential Cryptanalysis of Round-Reduced Simon and Speck.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Memory-Demanding Password Scrambling.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Catena: A Memory-Consuming Password Scrambler.
IACR Cryptol. ePrint Arch., 2013

Cryptanalysis of the Speck Family of Block Ciphers.
IACR Cryptol. ePrint Arch., 2013

Differential Cryptanalysis of Reduced-Round Simon.
IACR Cryptol. ePrint Arch., 2013

A Framework for Automated Independent-Biclique Cryptanalysis.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
The Collision Security of MDC-4 The Collision Security of MDC-4.
IACR Cryptol. ePrint Arch., 2012

Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers.
IACR Cryptol. ePrint Arch., 2012

Designing the API for a Cryptographic Library - A Misuse-Resistant Application Programming Interface.
Proceedings of the Reliable Software Technologies - Ada-Europe 2012, 2012

Weimar-DM: A Highly Secure Double-Length Compression Function.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
McOE: A Foolproof On-Line Authenticated Encryption Scheme.
IACR Cryptol. ePrint Arch., 2011

Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011


  Loading...